Originally from BHIS: Android's Sideloading Lockdown Explained with Cameron, Dave, and Sean ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Posts by
Originally from Flare: Validating Thousands of Credentials at Scale: Lessons from Six Months of Identity Exposure Management ( :-{ı▓ #flare #CTI #cyberresearch
Originally from MS Threat Intel: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise ( :-{ı▓ #CTI #cybersecurity #cyberresearch
Originally from From TrustedSec: The Game Is Over? Gamification of Infosec - Security Noise Ep 8.14 ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch
Originally from From WWHF: Death by Dashboards: Moving the Needle on What Actually Matters | Tim Medin ( :-{ı▓ #WWHF #BHIS #cyberresearch
Originally from BHIS: BHIS - Talkin' Bout [infosec] News 2026-04-20 ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Originally from This Week in 4n6: Week 16 – 2026 ( :-{ı▓ #dfir #incidentresponse #cyberresearch
Originally from From TrustedSec: Get Ready for Dungeons & Daemons! Are you in? #hacker #TrustedSec #rpg ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch
Originally from From WWHF: Hacks Hackers Hate Built In Bins to Bunk Baddies ( :-{ı▓ #WWHF #BHIS #cyberresearch
Originally from ProjectDiscovery: Neo v. DIY: The gap between a single finding and a mature security program ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch
Originally from BHIS: Backdoors & Breaches | Introducing the ALL NEW Online Platform ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Originally from Flare: Threat Briefing for CISOs: Staying Ahead of the Industrialized Phishing Economy ( :-{ı▓ #flare #CTI #cyberresearch
Originally from Holocron OpenBrain with Alex Minster | Episode 48 ( :-{ı▓
Originally from TrustedSec: Mythos, Memory Loss, and the Part InfoSec Keeps Missing ( :-{ı▓ #trustedsec #pentesting #cyberresearch
Originally from From TrustedSec: Dungeons & Daemons #TrustedSec #rpg #hacker ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch
Originally from MS Threat Intel: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise ( :-{ı▓ #CTI #cybersecurity #cyberresearch
Originally from Unit 42: A Deep Dive Into Attempted Exploitation of CVE-2023-33538 ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from DataDog: The case for dependency cooldowns in a post-axios world ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
Originally from TrustedSec: Dungeons and Daemons ( :-{ı▓ #trustedsec #pentesting #cyberresearch
Originally from Red Canary: Identity, browsers, and node.js: Everything you missed in the Threat Detection Report miniseries ( :-{ı▓ #threatintel #redcanary #cyberresearch
Originally from From TrustedSec: Webinar - You Had Us at the First Alert: A Guide to Finding Frequently Missed Detections ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch
Originally from BHIS: Signed, Trusted, and Abused: Proxy Execution via WebView2 ( :-{ı▓ #BlackHillsInfoSec #Pentesting #cyberresearch
Originally from Red Canary: New: Use response actions to update Zscaler policies and block threats ( :-{ı▓ #threatintel #redcanary #cyberresearch
Originally from Flare: The Identity Kill Chain: A Complete History of Identity Security from Passwords to AI Agents ( :-{ı▓ #flare #CTI #cyberresearch
Originally from TrustedSec: Benchmarking Self-Hosted LLMs for Offensive Security ( :-{ı▓ #trustedsec #pentesting #cyberresearch
Originally from From WWHF: Golden Age of AI Agents: Think Like a Boss and Work Like a Hacker | Jaclyn (Jax) Scott ( :-{ı▓ #WWHF #BHIS #cyberresearch
Originally from LiteLLM Supply Chain Compromise | Episode 47 ( :-{ı▓
Originally from This Week in 4n6: Week 15 – 2026 ( :-{ı▓ #dfir #incidentresponse #cyberresearch
Originally from From WWHF: I'm In Your Logs Now, Deceiving Your Analysts and Blinding Your EDR | Olaf Hartong ( :-{ı▓ #WWHF #BHIS #cyberresearch
Originally from BHIS: BHIS - Talkin' Bout [infosec] News 2026-04-13 ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch